0day.today 1337day.com – La plus grande base de données de Exploit dans le monde.

Nous utilisons un domaine DOMAIN_LINK
Si vous voulez acheter un exploit ou payer un service vous avez besoins d’Or. Nous ne voulons pas que notre site soit utiliser comme outil de piratage , de sorte que touts types d’actions qui pourrais affecter illegalement d’autres utilisateurs ou sites web ou vous n’avez pas l’autorisation vous serez bannit et votre compte ainsi que vos donnees seront supprimees.
Les administrateur de 0day.today 1337day utilises des moyens de contacts officiels. Mefiez-vous des imposteurs!
- Lire le [ J’accepte ]
- Lire le [ Envoyer ] Regles
- Visiter le [ faq ] page
- [ Enregistrement ] profil
- Obtenir [ GOLD ]
- Si vous voulez [ vendre ]
- Si vous voulez [ acheter ]
- Si vous vous perdez [ Compte ]
- Une questions [ [email protected] ]
- Connexion
- Page d’enregistrement
- Restauration de compte
- Foire aux questions
- Contactez-nous
- Regle de publication
- Page de contrat
Mail:
Jabber:
Facebook:
Twitter:
Inj3ct0r
Vous pouvez nous contacter par:
Inj3ct0r est la base ultime d’exploits et de vulnérabilités et une formidable ressource pour les chercheurs en vulnérabilités et les professionnels de la sécurité.
Notre objectif est de collecter des exploits par soumission et divers mailing listes; et les concentrer dans une base de données facilement consultable.
Ceci a été écrit à des fins éducatives. Utilisez le à vos propres risques. L’auteur ne pourra, en aucun cas, être tenu responsable en cas de dommage. // r0073r
Notre objectif est de collecter des exploits par soumission et divers mailing listes; et les concentrer dans une base de données facilement consultable.
Ceci a été écrit à des fins éducatives. Utilisez le à vos propres risques. L’auteur ne pourra, en aucun cas, être tenu responsable en cas de dommage. // r0073r
[ win32 ]
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Windows/x86 – Hide Console Window Shellcode (182 bytes)
Commentaires:
0
2 087
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Ege Balci
Exploits:
2
BusinessLevel:
1
Attention:
0
1 609
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Snir Levi
Exploits:
2
BusinessLevel:
1
Attention:
0
Windows/x86 – Executable Directory Search Shellcode (130 bytes)
Commentaires:
0
1 655
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Krzysztof Przybylski
Exploits:
2
BusinessLevel:
1
Attention:
0
Windows/x86 – Protect Process Shellcode (229 bytes)
Commentaires:
0
1 892
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Ege Balci
Exploits:
2
BusinessLevel:
1
Attention:
0
Windows/x86 – Keylogger Reverse UDP Shellcode (493 bytes)
Commentaires:
0
1 205
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Fugu
Exploits:
3
BusinessLevel:
2
Attention:
0
Windows/x86 – Password Protected TCP Bind Shell (637 bytes)
Commentaires:
0
1 660
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – Bind Shell TCP 4444 Shellcode (357 Bytes)
Commentaires:
0
1 762
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – Persistent Reverse Shell TCP (494 Bytes)
Commentaires:
0
1 501
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – InitiateSystemShutdownA() Shellcode (599 bytes)
Commentaires:
0
1 431
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – MessageBoxA Shellcode (242 bytes)
Commentaires:
0
1 539
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – CreateProcessA cmd.exe Shellcode (253 bytes)
Commentaires:
0
1 880
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – localhost Port Scanner Shellcode (556 bytes)
Commentaires:
0
1 168
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
Windows/x86 – URLDownloadToFileA() + SetFileAttributesA() + WinExec() + ExitProcess() Shellcode (394
Commentaires:
0
1 272
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Roziul Hasan Khan Shifat
Exploits:
25
BusinessLevel:
2
Attention:
0
990
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Fugu
Exploits:
3
BusinessLevel:
2
Attention:
0
win32/xp SP3 x86 Null-Free WinExec Shellcode
Commentaires:
0
1 554
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
b3mb4m
Exploits:
15
BusinessLevel:
3
Attention:
0
win32/xp [TR] sp3 MessageBox – shellcode 24 bytes
Commentaires:
0
1 566
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
b3mb4m
Exploits:
15
BusinessLevel:
3
Attention:
0
win32/xp sp3 Restart computer – 57 Bytes
Commentaires:
0
2 170
Security Risk Medium
D
Download
–
Verified by
gratuit
You can open this exploit for free
TUNISIAN CYBER
Exploits:
67
BusinessLevel:
6
Attention:
0
win32/xp sp3 Create ("file.txt") – 83 bytes
Commentaires:
0
1 977
Security Risk Low
D
Download
–
Verified by
gratuit
You can open this exploit for free
TUNISIAN CYBER
Exploits:
67
BusinessLevel:
6
Attention:
0
3 888
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Ali Razmjoo
Exploits:
7
BusinessLevel:
2
Attention:
0
win32/7 x86 ultimate Add Admin ALI/ALI & Enable RDP Obfuscated Shellcode – 1218 bytes
Commentaires:
0
3 083
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
Ali Razmjoo
Exploits:
7
BusinessLevel:
2
Attention:
0
win32 / windows 7 Add Admin User Shellcode – 194 bytes
Commentaires:
0
10 867
Security Risk Medium
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Giuseppe D’Amore
Exploits:
9
BusinessLevel:
3
Attention:
0
Windows7 Disable Task Manager Shellcode – 326 chars
Commentaires:
1
14 378
Security Risk High
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0
Windows7 Force Shutdown Shellcode – 215 chars
Commentaires:
0
8 857
Security Risk High
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0
Windows7 Force Terminate Explorer Shellcode – 255 chars
Commentaires:
0
6 315
Security Risk High
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0
Windows7 Sub_Xor MessageBox Exec Shellcode – 265 Bytes
Commentaires:
0
8 800
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
KedAns-Dz
Exploits:
292
BusinessLevel:
21
Attention:
0
win32/xp sp3 – Full ROP calc shellcode
Commentaires:
0
6 726
Security Risk High
D
Download
–
Verified by
gratuit
You can open this exploit for free
b33f
Exploits:
12
BusinessLevel:
4
Attention:
0
win32/7 Ultimate MessageBox ShellCode
Commentaires:
0
5 444
Security Risk Unsored
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0
win32/Seven Ultimate calc.exe ShellCode
Commentaires:
0
7 048
Security Risk Unsored
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0
win32/Seven Ultimate mspaint.exe ShellCode
Commentaires:
0
4 054
Security Risk Unsored
D
Download
–
Not verified yet
gratuit
You can open this exploit for free
Ayrbyte
Exploits:
20
BusinessLevel:
4
Attention:
0












How to buy exploit? Two ways to buy required exploit. Currency, that we accept.
and buy required exploit in our database.
What is 0day.today 1337day Gold? How to buy 0day.today 1337day Gold? How to earn 0day.today 1337day Gold?